Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Enhanced Discovering Computers 2017
Quiz 5: Digital Security Ethics and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
True/False
If a program or device has a default password, be sure to retain it.
Question 102
True/False
Audit trails only record unsuccessful access attempts.
Question 103
True/False
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
Question 104
True/False
Programmers often build trapdoors into programs during system development.
Question 105
True/False
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
Question 106
True/False
Both Windows and Mac operating systems include firewall capabilities.
Question 107
True/False
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
Question 108
True/False
If you are nervous, a signature might not match the one on file in a signature verification system.
Question 109
True/False
PINs are not the same as passwords.
Question 110
True/False
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
Question 111
True/False
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.